LEADER 04632nam 22007815 450 001 9910484728403321 005 20200705095730.0 010 $a3-319-43283-4 024 7 $a10.1007/978-3-319-43283-0 035 $a(CKB)3710000000765281 035 $a(DE-He213)978-3-319-43283-0 035 $a(MiAaPQ)EBC6283274 035 $a(MiAaPQ)EBC5587431 035 $a(Au-PeEL)EBL5587431 035 $a(OCoLC)955286928 035 $a(PPN)194515257 035 $a(EXLCZ)993710000000765281 100 $a20160725d2016 u| 0 101 0 $aeng 135 $aurnn|008mamaa 181 $ctxt$2rdacontent 182 $cc$2rdamedia 183 $acr$2rdacarrier 200 10$aConstructive Side-Channel Analysis and Secure Design $e7th International Workshop, COSADE 2016, Graz, Austria, April 14-15, 2016, Revised Selected Papers /$fedited by François-Xavier Standaert, Elisabeth Oswald 205 $a1st ed. 2016. 210 1$aCham :$cSpringer International Publishing :$cImprint: Springer,$d2016. 215 $a1 online resource (X, 219 p. 74 illus.) 225 1 $aSecurity and Cryptology ;$v9689 311 $a3-319-43282-6 327 $aSecurity and Physical Attacks -- Exploiting the Physical Disparity: Side-Channel Attacks on Memory Encryption -- Co-location detection on the Cloud -- Simple Photonic Emission Attack with Reduced Data Complexity -- Side-Channel Analysis (case studies) -- Power Analysis Attacks against IEEE 802.15.4 Node -- Improved Side-Channel Analysis Attacks on Xilinx Bitstream Encryption of 5, 6, and 7 Series -- Dismantling real-world ECC with Horizontal and Vertical Template Attacks -- Fault Analysis -- Algorithmic Countermeasures Against Fault Attacks and Power Analysis for RSA-CRT -- Improved Differential Fault Analysis on Camellia-128 -- A Note on the Security of CHES 2014 Symmetric Infective Countermeasure -- Side-Channel Analysis (tools) -- Simpler, Faster, and More Robust T-test Based Leakage Detection -- Design and implementation of a waveform-matching based triggering system -- Robust and One-Pass Parallel Computation of Correlation-Based Attacks at Arbitrary Order. 330 $aThis book constitutes revised selected papers from the 7th International Workshop on Constructive Side-Channel Analysis and Secure Design, COSADE 2016, held in Graz, Austria, in April 2016. The 12 papers presented in this volume were carefully reviewed and selected from 32 submissions. They were organized in topical sections named: security and physical attacks; side-channel analysis (case studies); fault analysis; and side-channel analysis (tools). 410 0$aSecurity and Cryptology ;$v9689 606 $aData encryption (Computer science) 606 $aComputer security 606 $aManagement information systems 606 $aComputer science 606 $aAlgorithms 606 $aComputer science?Mathematics 606 $aComputer hardware 606 $aCryptology$3https://scigraph.springernature.com/ontologies/product-market-codes/I28020 606 $aSystems and Data Security$3https://scigraph.springernature.com/ontologies/product-market-codes/I28060 606 $aManagement of Computing and Information Systems$3https://scigraph.springernature.com/ontologies/product-market-codes/I24067 606 $aAlgorithm Analysis and Problem Complexity$3https://scigraph.springernature.com/ontologies/product-market-codes/I16021 606 $aDiscrete Mathematics in Computer Science$3https://scigraph.springernature.com/ontologies/product-market-codes/I17028 606 $aComputer Hardware$3https://scigraph.springernature.com/ontologies/product-market-codes/I1200X 615 0$aData encryption (Computer science). 615 0$aComputer security. 615 0$aManagement information systems. 615 0$aComputer science. 615 0$aAlgorithms. 615 0$aComputer science?Mathematics. 615 0$aComputer hardware. 615 14$aCryptology. 615 24$aSystems and Data Security. 615 24$aManagement of Computing and Information Systems. 615 24$aAlgorithm Analysis and Problem Complexity. 615 24$aDiscrete Mathematics in Computer Science. 615 24$aComputer Hardware. 676 $a005.82 702 $aStandaert$b François-Xavier$4edt$4http://id.loc.gov/vocabulary/relators/edt 702 $aOswald$b Elisabeth$4edt$4http://id.loc.gov/vocabulary/relators/edt 801 0$bMiAaPQ 801 1$bMiAaPQ 801 2$bMiAaPQ 906 $aBOOK 912 $a9910484728403321 996 $aConstructive Side-Channel Analysis and Secure Design$93084064 997 $aUNINA